Overview Offensive Security Certified Professional Certification is self proclaimed to be the first hands-on offensive information security certification, built and designed to challenge OSCP students to prove they have a clear and practical understanding of the penetration testing process and life-cycle. An Offensive Security Certified Professional (OSCP) has to go …

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains every single file and directory starts from the root directory. Only root user has write privilege under this directory. bin contains binary programs (also known as …

Two days after researchers exposed a National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online discussion aimed at preventing the same kind of unwelcome attention. The thread, according to a document WikiLeaks published Tuesday, was titled “What did Equation do wrong, …

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network related traffic generated by various applications. Proxy chains has a great importance when it comes to anonymizing the traffic generated by footprinting and doing nmap to …

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1. Aircrack-ng Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements …

According to news released by BBC, South Korea’s military cyber command, set up to guard against hacking, appears to have been breached by North Korea, the military has said. A spokesman told the BBC that classified information was thought to have been stolen, although it is not clear exactly what …

This time one of the World’s leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker has supposedly breached video sharing platform DailyMotion and stolen details for 87.6 million accounts, belonging to approximately 85 million users, according to data breach index website …

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system without validating that user’s input. This can happen one of two ways, via the server (or back end) and via the client side. Supplying multiple …

Usually you won’t see any organization or institution allowing you to hack their internal system for any cause but this time without getting into any trouble the US Military is allowing hackers a chance to point out vulnerabilities in their online systems. The permission is granted through a military-wide applicable, …

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host of other sites, causing outages and slowness for many of Dyn’s customers. A widespread cyber-attack was carried out against some of the world’s biggest websites on …

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company said Wednesday. Czech police said the Russian was arrested in cooperation with the FBI within 12 hours, thanks to a rapid exchange of information with American …

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider’s web which can be accessed via internet. The web browser is a software program that acts like a computer program e.g firefox, chrome, safari (Web clients). …